Solved

SAS Adapter for PC

Posted on 2013-12-09
5
404 Views
Last Modified: 2013-12-09
I am looking to implement SED drives for some desktop machines.  Because there are so few SATA SED (self encrypting) drives, it seems easier to use an SAS SED drive.

Anyone know of a reasonably priced SAS drive adapter that will go into a PC and allow the use of an internal SAS drive to replace the existing SATA drive.  I need one that can handle SAS SED drives.

Or some way to leverage the TPM chip in the desktop machine, so that if the hard drive is removed from the desktop machine, the encryption key is thus separated from the SED drive and the data is unreadable.
0
Comment
Question by:dakota5
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 47

Accepted Solution

by:
David earned 400 total points
ID: 39706080
LSI has them, but you're in for some sticker shock.   It probably doesn't make sense to do this to a desktop computer.  

But if you must ...
Here is link for the software, and it tells you what MegaRaid controllers are compatible.  
http://www.lsi.com/products/raid-controllers/pages/megaraid-safestore-software.aspx

software & firmware $150, and cheapest controller 9260-4i maybe $350 or so.
0
 
LVL 38

Assisted Solution

by:Rich Rumble
Rich Rumble earned 100 total points
ID: 39706162
Again my article :)
http://www.experts-exchange.com/Security/Encryption/A_12134-Choosing-the-right-encryption-for-your-needs.html

TPM isn't all that great, and since the Gov't has a hard enough time against non-TPM software, I wouldn't even recommend its use. I don't trust it:
https://www.schneier.com/blog/archives/2005/08/trusted_computi.html
https://www.schneier.com/crypto-gram-0208.html#1
And UEFI is probably worse to trust: https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf

I use TrueCrypt myself, Bruce Schneier uses TC, Snowden used TC. I think it's a good solution as well.

-rich
0
 
LVL 47

Assisted Solution

by:David
David earned 400 total points
ID: 39706208
I'm a professional storage developer/architect .. i assure you the SED / TCG is rock solid, fast, and safe.  It works flawlessly with RAID as well.  

As far as the government having troubles, they can't even get the ObamaCare site up after 3+ years and $1B, so  let's not use the government as a baseline for getting anything working right.

TrueCrypt, BitLocker & PGP can be decrypted easily with a $299 product.
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 39706323
>TrueCrypt, BitLocker & PGP can be decrypted easily with a $299 product.
Only when the OS is running, or has been in hibernation and it has to support a FireWire connection (and or be able to have a plug-n-play Firewire adapter). Passware and Elcomsoft both have the same "decryptor" but it only accesses the decryption key in RAM or from a hibernation file.
All covered in my article linked above btw :) Nothing wrong with hardware or software, but you have to know the attack vectors for each, and both have the same attack's, when the OS is running the data is not encrypted, when the OS is off, the data can't be accessed (save a plain-text hibernation for page file). Security is a process and not a program, you have to understand the risks and weigh the likelihood of the attacks as well.
-rich
0
 

Author Closing Comment

by:dakota5
ID: 39706425
Thank you for continuing with this line of questioning.  richcrumble has provided great background and high-level information, but I appreciate diethe giving me some practical information.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The article will include the best Data Recovery Tools along with their Features, Capabilities, and their Download Links. Hope you’ll enjoy it and will choose the one as required by you.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question